Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1561

Опубликовано: 23 июл. 2014
Источник: ubuntu
Приоритет: low
CVSS2: 5.8

Описание

Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.

РелизСтатусПримечание
devel

released

31.0~b9+build1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [31.0+build1-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

31.0+build1-0ubuntu0.12.04.1
trusty

released

31.0+build1-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [31.0+build1-0ubuntu0.14.04.1]
upstream

released

31.0

Показывать по

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.

nvd
больше 11 лет назад

Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.

debian
больше 11 лет назад

Mozilla Firefox before 31.0 does not properly restrict use of drag-and ...

github
больше 3 лет назад

Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.

fstec
больше 11 лет назад

Уязвимость браузера Firefox, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

5.8 Medium

CVSS2